- What are you doing to develop your “technology literacy”?
- Are the four skillsets (business acumen, technology literacy, data analytics, and a hacker mentality) confined to being needed for blockchain?
- This is an incredibly useful article in that it lays out all the components of a smartphone, with photos, and explains in simple terms what they do and where they come from. Why is so important that a good deal of the components for a Chinese smartphone come from the U.S?
- ” Analysts predict the decision [by the U.S. to ban U.S. components in Chinese Huawei products] could encourage China’s desire to build more technology within its own borders. That would be a difficult, costly, and in some areas sub-par, move to take. But long-term it would give China a chance to set its own standards on future technologies.” What issues arise when countries have different technology standards?
- The report here notes that the autonomous-driving vehicle was not “assertive enough” to push over in to heavy traffic. Is this a good thing, or a bad thing?
- How might you design “assertiveness” in to autonomous-driving software?
- When space-based internet is discussed, the discussion usually focuses on ” a significant portion of the world’s population that isn’t yet online “. However, space-based internet could fundamentally change how countries like China and Iran are online. In what ways?
- What sort of companies could you build if internet were available everywhere?
- Why is it taking so long to deploy robotic construction techniques?
- What are some issues with using robots to build houses?
- The hackers “kept to normal U.S. business schedules. ” Why is this an important part of criminal hacking?
- Then they sent me a fake invoice that said, “Hey, can you send our payment to this other place?” How could you train users to not be conned by this?
A security lapse at Canada’s fourth largest cell network, Freedom Mobile, exposed customer data.
Security researchers Noam Rotem and Ran Locar found an Elasticsearch server leaking five million logs containing customer data. The server wasn’t protected with a password, allowing anyone to access the data.
Source: Tech Crunch
Date: May 11th, 2019
Link: https://techcrunch.com/2019/05/07/freedom-mobile-data-leak/
Discussion
- What sorts of failures in systems design and systems implementation lead to customer data being on a server that is not protected?
- How could a company avoid this glaringly obvious mistake?
It’s one of the fastest growing technology companies in the world.
Customers took more than five billion rides on the service last year, spending almost $50 billion US in the process.
And each and every time someone ordered up one of the company’s services — the company lost about 58 cents.
Source: CBC News
Date: May 11th, 2019
Link: https://www.cbc.ca/news/business/uber-technology-ipo-1.5084575
Discussion
- Why is Uber considered a tech company?
- What is it about tech companies that makes people want to invest in them?
- Facebook says that its “systems are not perfect”, but how can it be making such mistakes?
- What steps could you make to improve the Facebook systems?
- What are some points to be made for BUYING shares in Uber?
- What are some points to be made for NOT BUYING shares in Uber?